SlideShare a Scribd company logo
International Journal of Science and Engineering Applications
Volume 4 Issue 3, 2015, ISSN-2319-7560 (Online)
www.ijsea.com 100
Modified Page Rank Model in Investigation of
Criminal Gang
Ting LU
Research Center for Cloud Computing
North China University of Technology,
Beijing 100043, China
Qi Gao
Department of Mathematics,
Shandong Normal University,
Jinan 250002 China.
Xudong Wang
Department of Information System,
Shanghai University,
Shanghai 201800,China
Cong LIU
Department of Computer Science, Shandong
University of Science and Technology,
Qingdao 266590, China
Abstract:In this paper, we consider a criminal investigation on the collective guilt of part members in a working group. Assuming that
the statistics we used are reliable, we present the Page Rank Model based on mutual information. First, we use the average mutual info
rmation between non-suspicious topics and the suspicious topics to score the topics by degree of suspicion. Second, we build the correl
ation matrix based on the degree of suspicion and acquire the corresponding Markov state transition matrix. Then, we set the original v
alue for all members of the working group based on the degree of suspicion. At the last, we calculate the suspected degree of each me
mber in the working group. In the small 10-people case, we build the improved Page Rank model. By calculating the statistics of this c
ase, we acquire a table which indicates the ranking of the suspected degree. In contrast with the results given in this issue, we find thes
e two results basically match each other, indicating the model we have built is feasible. In the current case, firstly, we obtain a ranking
list on 15 topics in order of suspicion via Page Rank Model based on mutual information. Secondly, we acquire the stable point of Mar
kov state transition matrix using the Markov chain. Then, we build the connection matrix based on the degree of suspicion and acquire
the corresponding Markov state transition matrix. Last, we calculate the degree of 83 candidates. From the result, we can see that those
suspicious are on the top of the ranking list while those innocent people are at the bottom of the list, representing that the model we ha
ve built is feasible. When suspicious topics and conspirators changed, a relatively good result can also be obtained by this model. In th
e current case, we have the evidence to believe that Dolores and Jerome, who are the senior managers, have significant suspicion. It is
recommended that future attention should be paid to them. The Page Rank Model, based on mutual information, takes full account of t
he information flow in message distribution network. This model can not only deal with the statistics used in conspiracy, but also be ap
plied to detect the infected cells in a biological network. Finally, we present the advantages and disadvantages of this model and the dir
ection of improvements.
Keywords: Page Rank ;Markov Chain; Criminal Gangs; Biological Model; Algorithm; Markov Chain
1. INTRODUCTION
1.1 Background
With the advent of the information age, information technology
development has brought new challenges and opportunities to the
public security work. Because of its superiority, people are
paying close attention to how to integrate and reuse to the public
security data resources and how to achieve comprehensive
application of global data, the automatic association of all kinds
of information as well as the automatic mining function of a
variety of cues, which will provide integrated applications in the
information handling. Using the semantic network analysis and
the relevant models plays a major role in improving the
efficiency and accuracy of detection.
1.2 What is “Crime Gangs”?
Crime Gangs is a crime form, referring to the two or more
persons jointly committing one or more crimes. Intelligence
information (such as the collection of the relevant people’s
conversations in this given case) is the technical basis of the
intelligence analysis. The implementation of criminal
intelligence analysis is based on intelligence gathering, mining
and establishing crime patterns, analyzing and judging criminal
clues as well as a variety of relationships. Building an efficient
model to analyze the relevant information will surely provide
some useful clues for the detection of cases and the judgment of
criminal suspects.
1.3 The Mission of Our Team
In this paper, we would like to introduce the theory of
information analysis to solve the problems, which is described
as follows: In the previous case, it is our team’s duty to identify
the guilty parties among the 10 candidates. Similarly, the other
problem is to solve a relatively larger case, where there are
about 83 candidates.
The analysis and process of these problems are divided into
three steps. Firstly, we use the method of mutual information to
score all the topics mentioned. Secondly, we can acquire the
correlation matrix by calculating the score of the associated
topics among the candidates. Thirdly, by solving the Markov
Transfer Matrix, we get the stable point of Markov Transfer
Matrix, which is the final index of 83 candidates. By analyzing
this index, the 83 degree of suspicion can be determined.
2. PROBLEM ANALYSIS
2.1 Topics’ Suspicious Degree Analysis
First, we analyze the suspicious degree of talks between each
other, using the mutual information and entropy in information
theory, defined as M(A,B) = I(A) + I(B) - I(A,B), to obtain the
International Journal of Science and Engineering Applications
Volume 4 Issue 3, 2015, ISSN-2319-7560 (Online)
www.ijsea.com 101
scores of the 12 undetermined topics and the scores of
suspicious ones(Obviously, the scores of the suspicious are
supposed to be higher than the others). Further illustration is put
in models.
2.2 The Transmission of Suspicious Information in the
Working Group Analysis
The work group is divided into five parts, namely, the confirmed
suspects, the people with some suspicion, the undetermined
people and the innocent (listed by the degree of suspicion).
Because we refer to Google’s PangeRank algorithm, we need to
obtain the correlation matrix of this group of people first. Then
we can use this algorithm to get the Markov Transfer Matrix and
later get the stable points using the nature of Markov. The
acquisition of the correlation matrix is based on the message
topics among the 83 people. We can use gij to represent the total
scores of all the topics, thus getting an 83*83 correlation matrix.
2.3 The Initial Vector Distribution of the Working Group
Analysis
To solve the Markov stable point, we need to use the initial
vector distribution. We define the scores of the suspicious as α
(The total number of this group of people is n); the scores of the
innocent is 0; the scores of the undecided is β (The total number
of this group of people is m). They satisfy the equation nα + mβ
=1, and then we can decide the values of α and β through the
search of α with step size of 0.1
3. BASIC ASSUMPTIONS OF OUR
MODEL
3.1. All data is true and reliable.
3.2. There is valid evidence to prove the people who are
suspicious.
3.3. There is valid evidence to prove the people who are
innocent.
3.4. The suspicious topics have higher degree of doubt than that
of the undermined ones.
3.5. An objective and subjective attitude is kept in the process of
handling the cases.
3.6. These topics give a valid summary of the messages.
4. MODEL AND SOLUTION
Our whole model is divided into 3 parts, including 3.1, 3.2 and
3.3. In the 3.4 part, we use the whole model to analyze a simple
example. And in 3.5 and 3.6, we solve the real problem
presented in question 1, and its changed version in question 2.
4.1 Mutual Information Algorithm
Let me put a simple example to better illustrate this algorithm.
“What a good weather today! I would like to go fishing.” A
says to B. The words, such as “today”, “weather”, “good”, “I”,
“fishing” involved in this conversation, can be seen as key
words, and we can use 1 2, , , na a a to represent them.
When B says to A:“Yeah, really good weather! I will go
climbing.” Also, the words such as “weather”, “hiking”, “good”,
“I”, can be extracted as key words and we can use
1 2, , , mb b b to represent them. Here, we list the relationship
between the words of these two people.
Table 1: the language relationship table
A
today good fishing weather I
1 1 1 1 1 0 0
B weather I good climbing
0 0 0 1 1 1 1
Notes: “1” in the second row and second column of the table rep
resents the key word “today” said by A, but “0” in the fourth ro
w and second column represents that B didn’t say the key word
“1”indicates the value of mentioned topic in the chat,
“0”indicates the value of topic which is not mentioned in the
table.
We can use the formula of mutual information M(X,Y) = I(X) +
I(Y) - I(X,Y)to get the value of the mutual information, defined
as M(X,Y), where I(X) represents the entropy from A, I(Y)
represents the entropy from B.
0 0 1 1( ) log logI X P P P P   (4.1-1)
0 0 1 1( ) log logI Y P P P P   (4.1-2)
10 10 11 11 01 01( , ) log log logI X Y P P P P P P    (4.1-3)
P0 and P1 denoting the probability of 0 and 1 respectively; P10,
P11 and P01 denoting the probability of (1, 0), (1, 1) and (0, 1)
respectively.
4.2 Markov Chain Model
In order to get the Markov state transition matrix, we first need
to get the 83*83 Markov correlation matrix(rows represent the
person’s words, columns represent the words that others said to
him /her). According to each topic, sum up the weight of the
words involved in the conversation between one person and the
others so as to get the total weight of one person, in the same
way, we can come to the other people’s weight, thus getting an
83*83 Markov correlation matrix.
Although we use Google’s Page Rank model,some people are
not the information receivers in the case, so it is unavoidable
that the sum of a few columns in the association matrix is 0.
Taking this into account, when computing the Markov Transfer
Matrix, we do some special handling on the correlation matrix
to make the sum of all the columns of the correlation matrix
non-zero.
Define the Markov Transfer Matrix as ( )ijA a , then
'
j ij
i
c g  (4.2-1)
'
i ij
j
r g  (4.2-2)
Cj represents the sum of columns in matrix G(gij), ri represents
the sum of rows in matrix G(gij), gij represents the elements in
the correlation matrix G(gij).
The formula used to solve the elements in transfer matrix A is
'
(1 )
*
ij
ij
j
gd
a d
n c

  (4.2-3)
d is a model parameter, we choose to define d = 0.85 based on
experience. aij represents the summed scores of the message
topics involved in the conversation from person j to person i.
From the basic nature of the Markov chain, there is a stationary
distribution in the regular Markov chain 1 2( , , , )T
Nx x x x ,then
we can get the sorting in accordance with the conspiracy
possibility.
4.3 Improved Page Rank Model
As we have known,there are 7 conspirators among the 83
people in the second case and each person’s scores can be
defined as ( ), 1,2, ,7P i i  . And the scores of each
innocent person can be defined as P(j), j = 1,2,...,8. The model is
as follows:
7 8
1 1
max ( , ) ( ) ( )
i j
M s P i P j
 
   (4.3-1)
International Journal of Science and Engineering Applications
Volume 4 Issue 3, 2015, ISSN-2319-7560 (Online)
www.ijsea.com 102
. .st
Ax x (4.3-2)
1
1
n
i
i
x

 (4.3-3)
The objective function indicates the maximum probability gap
between the known conspirators and the innocent (All the
conspirators are put in the upper part of the list, and all
innocence in the lower part of the list, leaving the undecided
people located in the middle of the list). We use k to express the
maximum of mutual information in the 12 topics. 
represents the steps from the upper bound to 20. Through the
debugging and analysis, we find that when  is given a value
of 0.5, the results will be much more in line with the subject
requirements. s is the initial vector distribution, the
percentage of each conspirator is 0.1, and the percentage of each
innocent person equals to 0, so the undetermined equally
allocate the remaining percentage. We define that s ranges from
0.5 to 0.9 is distributed in steps of 0.1, and we can get an initial
vector distribution on the subject on the whole.
4.4 Solution of The 10-people Case
In practice, we conducted some exploratory analysis on the
previous case, and get 4 ranking list of the probability of all the
people when defining k =1,10,12,15,17,20,respectively.
Through comparative analysis, we find that when k=17, the
ranking we get will be more in line with the true outcome of the
case than other values, that is, people like Inez don't get off,
people like Carol are not falsely accused, and people like Bob
do not have the opportunity to get reduced sentences. When
k=17, we can obtain a ranking list of suspicious degree, listed as
follows:
Table 2:The Sorting Table of the degree of Suspicious (k=17)
Ranking Number Name
1 7 George
2 2 Bob
3 9 Inez
4 4 Dave
5 5 Ellen
6 1 Anne
7 8 Harry
8 10 Jaye
9 3 Carol
10 6 Fred
Conclusion Analysis:
(1)George and Dave are the given co-conspirators, ranking
fourth in the list. Meanwhile, Bob ranks second, illustrating he
is one of the co-conspirators, so he cannot get off. Inez ranks
third, meaning that we can also catch him.
(2)Jaye and Anne are both ranked relatively rearward, which is
in accordance with the given information. And based on Carol
ranking No.9, we can basically determine her innocence.
Overall, the solution derived from our models can meet the
actual requirements and have some promotional value.
From the previous analysis, we know that the 10-people case is
a microcosm of the current case, and the results of small case
subject has been given to us, so understanding and solving the
smaller case can be seen as a test of our models, which may help
us to modify them.
4.5 The Solution of the Current case for Problem 1
When conducting an exploratory analysis on the current case,
we used the same way as the first one to analyze. We found that
when k=17 or k=20, we can get two basically the same
probability rankings of all the people, much more in line with
the requirements listed in the subject.
First, we can obtain the ranking list of the 15 topics using the
Mutual Information Method.
Table 3:Score Ranking List of 15 Topics
Number Score
1 0.883016
2 0.857865
3 0.898072
4 0.87294
5 0.872976
6 0.857882
1 1
8 0.888021
9 0.883014
10 0.893037
11 1
12 0.888021
13 1
14 0.888034
15 0.883008
Notes: The numbers of suspicious topics are 7, 11, 13.
The suspicious degree ranking of the suspected, innocent and
the senior managers based on k=17.
Table4: The Sorting Table Based on the Suspicious Degree
of the Conspirators, Non-conspirators and Senior Managers (K=
17)
Ranking Name Number
1 Yao 68
2 Alex 22
4 Paul 44
6 Harvey 50
7 Dolores 11
8 Ulf 55
17 Jerome 17
19 Jean 19
27 Paige 3
28 Elsie 38
31 Darlene 49
46 Chris 1
57 Tran 65
58 Ellin 69
60 Gretchen 5
International Journal of Science and Engineering Applications
Volume 4 Issue 3, 2015, ISSN-2319-7560 (Online)
www.ijsea.com 103
Notes: The senior managers are Dolores, Jerome and Gretchen.
Conclusion Analysis:
(1) By analyzing the result, we can find that two senior
managers, namely Dolores and Jerome are both conspirators.
(2) The already known conspirators are shown in the forefront
of the ranking list, we can basically draw that they are the
conspirators.
(3)The already known non-conspirators are all at the rear of the
ranking list, except for Paige who ranks 27, the others can be
determined to be innocent. Although there are a few minor
differences, this result has been very much in line with the
actual situation, which means the feasibility and stability of the
model is very well.
4.6 The Solution of the Current Case for Problem 2
As to the second requirement, we can also use the Improved
Page Rank Model to analyze data. First obtain a modified
ranking list of the 15 topics, listed as follows:
Table 5:Score Ranking List of the 15 Modified Topics
number score
1 1
2 1.177737
3 1.20412
4 1.193429
5 1.172717
6 1.167063
7 1
8 1.199102
9 1.193429
10 1.20412
11 1
12 1.20412
13 1
14 1.173339
15 1.193429
Then we can get the ranking list about the suspicion degree of
the suspected, the innocent and the senior managers.
Table 6:The Sorting Table Based on the Suspicious Degree
of the Conspirators, Non-conspirators and Senior Managers
Number Name
1 Yao
2 Alex
4 Paul
6 Harvey
7 Dolores
8 Ulf
17 Jerome
19 Jean
27 Paige
28 Elsie
30 Darlene
45 Chris
57 Ellin
58 Tran
60 Gretchen
Notes: The senior managers are Dolores, Jerome and Gretchen,
the 7 suspected people are Yao, Alex, Paul, Harvey, Ulf, Elsie.
Conclusion Analysis
The newly added conspirator Chris does not make much
difference in results compared with the ones in the first
requirement. According to analysis, this may be due to Chris's
inactive involvement in the conversation, so even if he is one of
the conspirators, his influence on others is very weak, resulting
in the basically similar results.
4.7 The Solution of the Current Case for Problem 3
In this section, we introduce the conception of Semantic
network and apply the theory of Similarity to the calculation of
topic scores.
As we have obtained the original messages, which is a much
bigger corpus than that we used in the first two questions, so we
can apply the similarity analyze into our model. To describe it in
detail:
First: Calculate the similarities of among the 3 suspected
messages(A) and the 12 unsuspected messages (B),
A includes A1,A2,A3,B includes,
( , )i jSim A B
d




(4.7-1)
d : the distance between the two corpus.
 : an changeable parameter.(usually between 0 and 1)
Second: give the index rank of B1,B2,……,B12
12
1
( , ),( 1,2,3)j i j
j
B Sim A B i

  (4.7-2)
Third: set the value of A1,A2,A3.
( ),( 1,2,3 1....12)i jA Max B i j   (4.7-3)
So far, we successfully obtain the rank of the 15 messages,
comparing with the rank based on the index of mutual
information; this model theoretically provides a more credible
result.
5. ADVANTAGES AND
DISADVANTAGES
5.1 Advantages:
We introduced the concept of mutual information when
computing topics, and build the relationship between the
suspicious topics and the undetermined ones.
5.2 Disadvantages:
●As it is mentioned in requirement 3 that due to the
limitation of the message traffic, we can just roughly determine
the doubt degree of the topics by semantic network analysis.
● Though the computing of the mutual information, we
can just determine the values of the 12 undetermined topics,
however, the values of the 3 higher suspected ones are
artificially assigned.
●Without much experience for reference in the model, the
accuracy of the results may be undermined.
International Journal of Science and Engineering Applications
Volume 4 Issue 3, 2015, ISSN-2319-7560 (Online)
www.ijsea.com 104
6. PROMOTION OF THE MODEL
Through the analysis, we found that our model is considerable
promotional, such as being used as a method to find the infected
or diseased cells in a biological network. Briefly speaking, if we
can get the meaningful characteristics from all the cells can
calculate the mutual information between these characteristics.
Later, we can try to obtain the mutual information between the
undetermined cells and the infected ones so as to get the
probability ranking list of the undetermined. Though the
detecting process, we may us the Improved Search-based Page
Rank Model and the Markov Transfer Matrix to simplify our
operation as well as increase the validity of our research.
We have introduced the mutual information theory in analyzing
this problem in the first two parts, with a relatively satisfactory
result. As far as we know, semantic network analysis which is a
widely used in artificial intelligence and computational
linguistics. It provides a structure and process for reasoning
about knowledge or language. And another useful computational
linguistics capability in natural language processing is text
analysis.
7. CONCLUSION
In this paper, we introduce the model of improved Page Rank
algorithm based on mutual information and successfully solved
the case problems. The consequences are listed as follows: In
the previous case, George and Dave are the given
co-conspirators. Bob and Inez are proved other co-conspirators.
Carol is innocent. Overall, the solution derived from our models
can meet the actual requirements and have some promotional
value. Then in the next case, by analyzing the result, we can find
that two senior managers, namely Dolores and Jerome are both
conspirators. This will help the investigation of the cases. The
other version of the second case, the newly added suspect Chris
does not make much difference in results compared with the
ones in the first requirement. According to analysis, this may be
due to Chris's inactive involvement in the conversation, so even
if he is one of the conspirators, his influence on others is very
weak, resulting in the basically similar results.
All in all, as we only use the topics which are derived from
original messages in mutual information analysis, so our result
will be more valid if we have a larger corpus. That is to say, we
can introduce semantic network and use similarity-computing to
acquire a more precise result, in that way, our judgment will be
more reasonable.
8. ACKNOWLEDGMENTS
This work was supported in part by the Graduate Innovation
Foundation Project of Shan-dong University of Science and
Technology (YC140106). Also, we would like to thank those
anonymous reviewers for their constructive comments to help us
improve the paper.
9. REFERENCES
[1]Haveliwala, T. (1999) Efficient Computation of PageRank.
Technical Report. Stanford.
[2]Battiti, R.(1994)Using mutual information for selecting
features in supervised neural net learning.
[3]Terry. (1999) The Page Rank Citation Ranking: Bringing
Order to the Web. Technical Report. Stanford InfoLab.
[4]Jackendoff, Ray S.(1972) Semantic Interpretation in
Generative Grammar.
[5]Xing, W., Ghorbani A. (2004) Weighted Page Rank algorithm,
Communication Networks and Services Research. Proceedings.
[6]Catherine Benincasa (2006) Page Rank Algorithm.
[7]John F. Sowa (1991) Principles of Semantic Networks.
Alexander Kraskov, Harald Stogbauer, and Peter Grassberger
(2004) Estimating mutual information.

More Related Content

What's hot

Sensing Trending Topics in Twitter for Greater Jakarta Area
Sensing Trending Topics in Twitter for Greater Jakarta Area Sensing Trending Topics in Twitter for Greater Jakarta Area
Sensing Trending Topics in Twitter for Greater Jakarta Area
IJECEIAES
 
A Survey Of Collaborative Filtering Techniques
A Survey Of Collaborative Filtering TechniquesA Survey Of Collaborative Filtering Techniques
A Survey Of Collaborative Filtering Techniques
tengyue5i5j
 
IMPROVED SENTIMENT ANALYSIS USING A CUSTOMIZED DISTILBERT NLP CONFIGURATION
IMPROVED SENTIMENT ANALYSIS USING A CUSTOMIZED DISTILBERT NLP CONFIGURATIONIMPROVED SENTIMENT ANALYSIS USING A CUSTOMIZED DISTILBERT NLP CONFIGURATION
IMPROVED SENTIMENT ANALYSIS USING A CUSTOMIZED DISTILBERT NLP CONFIGURATION
adeij1
 
Abstract
AbstractAbstract
Abstract
Suresh Prabhu
 
Discovering latent informaion by
Discovering latent informaion byDiscovering latent informaion by
Discovering latent informaion by
ijaia
 
Misconduct disclosure of the intermediates using the trusted authority
Misconduct disclosure of the intermediates using the trusted authorityMisconduct disclosure of the intermediates using the trusted authority
Misconduct disclosure of the intermediates using the trusted authority
eSAT Publishing House
 
Knowledge And Patterns
Knowledge And PatternsKnowledge And Patterns
Knowledge And Patterns
David Wilson
 
News Reliability Evaluation using Latent Semantic Analysis
News Reliability Evaluation using Latent Semantic AnalysisNews Reliability Evaluation using Latent Semantic Analysis
News Reliability Evaluation using Latent Semantic Analysis
TELKOMNIKA JOURNAL
 
76201960
7620196076201960
76201960
IJRAT
 
Sentiment Analysis on Twitter Data
Sentiment Analysis on Twitter DataSentiment Analysis on Twitter Data
Sentiment Analysis on Twitter Data
IRJET Journal
 
FAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MINING
FAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MININGFAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MINING
FAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MINING
ijnlc
 
Context Sensitive Relatedness Measure of Word Pairs
Context Sensitive Relatedness Measure of Word PairsContext Sensitive Relatedness Measure of Word Pairs
Context Sensitive Relatedness Measure of Word Pairs
IJCSIS Research Publications
 
Exploring the Current Trends and Future Prospects in Terrorist Network Mining
Exploring the Current Trends and Future Prospects in Terrorist Network Mining Exploring the Current Trends and Future Prospects in Terrorist Network Mining
Exploring the Current Trends and Future Prospects in Terrorist Network Mining
cscpconf
 
Prediction of Reaction towards Textual Posts in Social Networks
Prediction of Reaction towards Textual Posts in Social NetworksPrediction of Reaction towards Textual Posts in Social Networks
Prediction of Reaction towards Textual Posts in Social Networks
Mohamed El-Geish
 
DeepSearch_Project_Report
DeepSearch_Project_ReportDeepSearch_Project_Report
DeepSearch_Project_Report
Urjit Patel
 
IRJET- Fake News Detection using Logistic Regression
IRJET- Fake News Detection using Logistic RegressionIRJET- Fake News Detection using Logistic Regression
IRJET- Fake News Detection using Logistic Regression
IRJET Journal
 
Evolving Swings (topics) from Social Streams using Probability Model
Evolving Swings (topics) from Social Streams using Probability ModelEvolving Swings (topics) from Social Streams using Probability Model
Evolving Swings (topics) from Social Streams using Probability Model
IJERA Editor
 
Sentiment Analysis on Twitter
Sentiment Analysis on TwitterSentiment Analysis on Twitter
Sentiment Analysis on Twitter
Subarno Pal
 
Politycheck - Political Ideology Detection (Natural Language Processing Chall...
Politycheck - Political Ideology Detection (Natural Language Processing Chall...Politycheck - Political Ideology Detection (Natural Language Processing Chall...
Politycheck - Political Ideology Detection (Natural Language Processing Chall...
Hamza Mahmood
 
Unsupervised Learning of a Social Network from a Multiple-Source News Corpus
Unsupervised Learning of a Social Network from a Multiple-Source News CorpusUnsupervised Learning of a Social Network from a Multiple-Source News Corpus
Unsupervised Learning of a Social Network from a Multiple-Source News Corpus
htanev
 

What's hot (20)

Sensing Trending Topics in Twitter for Greater Jakarta Area
Sensing Trending Topics in Twitter for Greater Jakarta Area Sensing Trending Topics in Twitter for Greater Jakarta Area
Sensing Trending Topics in Twitter for Greater Jakarta Area
 
A Survey Of Collaborative Filtering Techniques
A Survey Of Collaborative Filtering TechniquesA Survey Of Collaborative Filtering Techniques
A Survey Of Collaborative Filtering Techniques
 
IMPROVED SENTIMENT ANALYSIS USING A CUSTOMIZED DISTILBERT NLP CONFIGURATION
IMPROVED SENTIMENT ANALYSIS USING A CUSTOMIZED DISTILBERT NLP CONFIGURATIONIMPROVED SENTIMENT ANALYSIS USING A CUSTOMIZED DISTILBERT NLP CONFIGURATION
IMPROVED SENTIMENT ANALYSIS USING A CUSTOMIZED DISTILBERT NLP CONFIGURATION
 
Abstract
AbstractAbstract
Abstract
 
Discovering latent informaion by
Discovering latent informaion byDiscovering latent informaion by
Discovering latent informaion by
 
Misconduct disclosure of the intermediates using the trusted authority
Misconduct disclosure of the intermediates using the trusted authorityMisconduct disclosure of the intermediates using the trusted authority
Misconduct disclosure of the intermediates using the trusted authority
 
Knowledge And Patterns
Knowledge And PatternsKnowledge And Patterns
Knowledge And Patterns
 
News Reliability Evaluation using Latent Semantic Analysis
News Reliability Evaluation using Latent Semantic AnalysisNews Reliability Evaluation using Latent Semantic Analysis
News Reliability Evaluation using Latent Semantic Analysis
 
76201960
7620196076201960
76201960
 
Sentiment Analysis on Twitter Data
Sentiment Analysis on Twitter DataSentiment Analysis on Twitter Data
Sentiment Analysis on Twitter Data
 
FAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MINING
FAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MININGFAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MINING
FAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MINING
 
Context Sensitive Relatedness Measure of Word Pairs
Context Sensitive Relatedness Measure of Word PairsContext Sensitive Relatedness Measure of Word Pairs
Context Sensitive Relatedness Measure of Word Pairs
 
Exploring the Current Trends and Future Prospects in Terrorist Network Mining
Exploring the Current Trends and Future Prospects in Terrorist Network Mining Exploring the Current Trends and Future Prospects in Terrorist Network Mining
Exploring the Current Trends and Future Prospects in Terrorist Network Mining
 
Prediction of Reaction towards Textual Posts in Social Networks
Prediction of Reaction towards Textual Posts in Social NetworksPrediction of Reaction towards Textual Posts in Social Networks
Prediction of Reaction towards Textual Posts in Social Networks
 
DeepSearch_Project_Report
DeepSearch_Project_ReportDeepSearch_Project_Report
DeepSearch_Project_Report
 
IRJET- Fake News Detection using Logistic Regression
IRJET- Fake News Detection using Logistic RegressionIRJET- Fake News Detection using Logistic Regression
IRJET- Fake News Detection using Logistic Regression
 
Evolving Swings (topics) from Social Streams using Probability Model
Evolving Swings (topics) from Social Streams using Probability ModelEvolving Swings (topics) from Social Streams using Probability Model
Evolving Swings (topics) from Social Streams using Probability Model
 
Sentiment Analysis on Twitter
Sentiment Analysis on TwitterSentiment Analysis on Twitter
Sentiment Analysis on Twitter
 
Politycheck - Political Ideology Detection (Natural Language Processing Chall...
Politycheck - Political Ideology Detection (Natural Language Processing Chall...Politycheck - Political Ideology Detection (Natural Language Processing Chall...
Politycheck - Political Ideology Detection (Natural Language Processing Chall...
 
Unsupervised Learning of a Social Network from a Multiple-Source News Corpus
Unsupervised Learning of a Social Network from a Multiple-Source News CorpusUnsupervised Learning of a Social Network from a Multiple-Source News Corpus
Unsupervised Learning of a Social Network from a Multiple-Source News Corpus
 

Viewers also liked

Risk Prediction for Production of an Enterprise
Risk Prediction for Production of an EnterpriseRisk Prediction for Production of an Enterprise
Risk Prediction for Production of an Enterprise
Editor IJCATR
 
Intuitionistic Fuzzy Semipre Generalized Connected Spaces
Intuitionistic Fuzzy Semipre Generalized Connected SpacesIntuitionistic Fuzzy Semipre Generalized Connected Spaces
Intuitionistic Fuzzy Semipre Generalized Connected Spaces
Editor IJCATR
 
Ijcatr04051009
Ijcatr04051009Ijcatr04051009
Ijcatr04051009
Editor IJCATR
 
Ijcatr04041017
Ijcatr04041017Ijcatr04041017
Ijcatr04041017
Editor IJCATR
 
Agent-Driven Distributed Data Mining
Agent-Driven Distributed Data MiningAgent-Driven Distributed Data Mining
Agent-Driven Distributed Data Mining
Editor IJCATR
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi Clouds
Editor IJCATR
 
Ijcatr04041015
Ijcatr04041015Ijcatr04041015
Ijcatr04041015
Editor IJCATR
 
Journal paper 1
Journal paper 1Journal paper 1
Journal paper 1
Editor IJCATR
 
Random Valued Impulse Noise Elimination using Neural Filter
Random Valued Impulse Noise Elimination using Neural FilterRandom Valued Impulse Noise Elimination using Neural Filter
Random Valued Impulse Noise Elimination using Neural Filter
Editor IJCATR
 
Ijcatr04051016
Ijcatr04051016Ijcatr04051016
Ijcatr04051016
Editor IJCATR
 
Ijcatr04041019
Ijcatr04041019Ijcatr04041019
Ijcatr04041019
Editor IJCATR
 
Assistive Examination System for Visually Impaired
Assistive Examination System for Visually ImpairedAssistive Examination System for Visually Impaired
Assistive Examination System for Visually Impaired
Editor IJCATR
 
A Formal Machine Learning or Multi Objective Decision Making System for Deter...
A Formal Machine Learning or Multi Objective Decision Making System for Deter...A Formal Machine Learning or Multi Objective Decision Making System for Deter...
A Formal Machine Learning or Multi Objective Decision Making System for Deter...
Editor IJCATR
 
Ijcatr04021016
Ijcatr04021016Ijcatr04021016
Ijcatr04021016
Editor IJCATR
 
Risk-Aware Response Mechanism with Extended D-S theory
Risk-Aware Response Mechanism with Extended D-S theoryRisk-Aware Response Mechanism with Extended D-S theory
Risk-Aware Response Mechanism with Extended D-S theory
Editor IJCATR
 

Viewers also liked (15)

Risk Prediction for Production of an Enterprise
Risk Prediction for Production of an EnterpriseRisk Prediction for Production of an Enterprise
Risk Prediction for Production of an Enterprise
 
Intuitionistic Fuzzy Semipre Generalized Connected Spaces
Intuitionistic Fuzzy Semipre Generalized Connected SpacesIntuitionistic Fuzzy Semipre Generalized Connected Spaces
Intuitionistic Fuzzy Semipre Generalized Connected Spaces
 
Ijcatr04051009
Ijcatr04051009Ijcatr04051009
Ijcatr04051009
 
Ijcatr04041017
Ijcatr04041017Ijcatr04041017
Ijcatr04041017
 
Agent-Driven Distributed Data Mining
Agent-Driven Distributed Data MiningAgent-Driven Distributed Data Mining
Agent-Driven Distributed Data Mining
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi Clouds
 
Ijcatr04041015
Ijcatr04041015Ijcatr04041015
Ijcatr04041015
 
Journal paper 1
Journal paper 1Journal paper 1
Journal paper 1
 
Random Valued Impulse Noise Elimination using Neural Filter
Random Valued Impulse Noise Elimination using Neural FilterRandom Valued Impulse Noise Elimination using Neural Filter
Random Valued Impulse Noise Elimination using Neural Filter
 
Ijcatr04051016
Ijcatr04051016Ijcatr04051016
Ijcatr04051016
 
Ijcatr04041019
Ijcatr04041019Ijcatr04041019
Ijcatr04041019
 
Assistive Examination System for Visually Impaired
Assistive Examination System for Visually ImpairedAssistive Examination System for Visually Impaired
Assistive Examination System for Visually Impaired
 
A Formal Machine Learning or Multi Objective Decision Making System for Deter...
A Formal Machine Learning or Multi Objective Decision Making System for Deter...A Formal Machine Learning or Multi Objective Decision Making System for Deter...
A Formal Machine Learning or Multi Objective Decision Making System for Deter...
 
Ijcatr04021016
Ijcatr04021016Ijcatr04021016
Ijcatr04021016
 
Risk-Aware Response Mechanism with Extended D-S theory
Risk-Aware Response Mechanism with Extended D-S theoryRisk-Aware Response Mechanism with Extended D-S theory
Risk-Aware Response Mechanism with Extended D-S theory
 

Similar to Ijsea04031005

H IDDEN M ARKOV M ODEL A PPROACH T OWARDS E MOTION D ETECTION F ROM S PEECH S...
H IDDEN M ARKOV M ODEL A PPROACH T OWARDS E MOTION D ETECTION F ROM S PEECH S...H IDDEN M ARKOV M ODEL A PPROACH T OWARDS E MOTION D ETECTION F ROM S PEECH S...
H IDDEN M ARKOV M ODEL A PPROACH T OWARDS E MOTION D ETECTION F ROM S PEECH S...
csandit
 
20142014_20142015_20142115
20142014_20142015_2014211520142014_20142015_20142115
20142014_20142015_20142115
Divita Madaan
 
Equirs: Explicitly Query Understanding Information Retrieval System Based on Hmm
Equirs: Explicitly Query Understanding Information Retrieval System Based on HmmEquirs: Explicitly Query Understanding Information Retrieval System Based on Hmm
Equirs: Explicitly Query Understanding Information Retrieval System Based on Hmm
International Journal of Engineering Inventions www.ijeijournal.com
 
25893434.pdf
25893434.pdf25893434.pdf
25893434.pdf
VilasPATIL85
 
San Francisco Crime Analysis Classification Kaggle contest
San Francisco Crime Analysis Classification Kaggle contestSan Francisco Crime Analysis Classification Kaggle contest
San Francisco Crime Analysis Classification Kaggle contest
Sameer Darekar
 
San Francisco Crime Prediction Report
San Francisco Crime Prediction ReportSan Francisco Crime Prediction Report
San Francisco Crime Prediction Report
Rohit Dandona
 
IT-601 Lecture Notes-UNIT-2.pdf Data Analysis
IT-601 Lecture Notes-UNIT-2.pdf Data AnalysisIT-601 Lecture Notes-UNIT-2.pdf Data Analysis
IT-601 Lecture Notes-UNIT-2.pdf Data Analysis
Dr. Radhey Shyam
 
A SURVEY OF MARKOV CHAIN MODELS IN LINGUISTICS APPLICATIONS
A SURVEY OF MARKOV CHAIN MODELS IN LINGUISTICS APPLICATIONSA SURVEY OF MARKOV CHAIN MODELS IN LINGUISTICS APPLICATIONS
A SURVEY OF MARKOV CHAIN MODELS IN LINGUISTICS APPLICATIONS
csandit
 
Mcs 021 solve assignment
Mcs 021 solve assignmentMcs 021 solve assignment
FAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MINING
FAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MININGFAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MINING
FAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MINING
kevig
 
soft computing BTU MCA 3rd SEM unit 1 .pptx
soft computing BTU MCA 3rd SEM unit 1 .pptxsoft computing BTU MCA 3rd SEM unit 1 .pptx
soft computing BTU MCA 3rd SEM unit 1 .pptx
naveen356604
 
KIT-601 Lecture Notes-UNIT-2.pdf
KIT-601 Lecture Notes-UNIT-2.pdfKIT-601 Lecture Notes-UNIT-2.pdf
KIT-601 Lecture Notes-UNIT-2.pdf
Dr. Radhey Shyam
 
Calculation of the Minimum Computational Complexity Based on Information Entropy
Calculation of the Minimum Computational Complexity Based on Information EntropyCalculation of the Minimum Computational Complexity Based on Information Entropy
Calculation of the Minimum Computational Complexity Based on Information Entropy
ijcsa
 
A unified prediction of computer virus spread in connected networks
A unified prediction of computer virus spread in connected networksA unified prediction of computer virus spread in connected networks
A unified prediction of computer virus spread in connected networks
UltraUploader
 
Simple (and Simplistic) Introduction to Econometrics and Linear Regression
Simple (and Simplistic) Introduction to Econometrics and Linear RegressionSimple (and Simplistic) Introduction to Econometrics and Linear Regression
Simple (and Simplistic) Introduction to Econometrics and Linear Regression
Philip Tiongson
 
Sentence Validation by Statistical Language Modeling and Semantic Relations
Sentence Validation by Statistical Language Modeling and Semantic RelationsSentence Validation by Statistical Language Modeling and Semantic Relations
Sentence Validation by Statistical Language Modeling and Semantic Relations
Editor IJCATR
 
Mcs 021
Mcs 021Mcs 021
Mcs 021
Ujjwal Kumar
 
A data mining tool for the detection of suicide in social networks
A data mining tool for the detection of suicide in social networksA data mining tool for the detection of suicide in social networks
A data mining tool for the detection of suicide in social networks
Yassine Bensaoucha
 
Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...
Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...
Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...
ijcsta
 
An application of artificial intelligent neural network and discriminant anal...
An application of artificial intelligent neural network and discriminant anal...An application of artificial intelligent neural network and discriminant anal...
An application of artificial intelligent neural network and discriminant anal...
Alexander Decker
 

Similar to Ijsea04031005 (20)

H IDDEN M ARKOV M ODEL A PPROACH T OWARDS E MOTION D ETECTION F ROM S PEECH S...
H IDDEN M ARKOV M ODEL A PPROACH T OWARDS E MOTION D ETECTION F ROM S PEECH S...H IDDEN M ARKOV M ODEL A PPROACH T OWARDS E MOTION D ETECTION F ROM S PEECH S...
H IDDEN M ARKOV M ODEL A PPROACH T OWARDS E MOTION D ETECTION F ROM S PEECH S...
 
20142014_20142015_20142115
20142014_20142015_2014211520142014_20142015_20142115
20142014_20142015_20142115
 
Equirs: Explicitly Query Understanding Information Retrieval System Based on Hmm
Equirs: Explicitly Query Understanding Information Retrieval System Based on HmmEquirs: Explicitly Query Understanding Information Retrieval System Based on Hmm
Equirs: Explicitly Query Understanding Information Retrieval System Based on Hmm
 
25893434.pdf
25893434.pdf25893434.pdf
25893434.pdf
 
San Francisco Crime Analysis Classification Kaggle contest
San Francisco Crime Analysis Classification Kaggle contestSan Francisco Crime Analysis Classification Kaggle contest
San Francisco Crime Analysis Classification Kaggle contest
 
San Francisco Crime Prediction Report
San Francisco Crime Prediction ReportSan Francisco Crime Prediction Report
San Francisco Crime Prediction Report
 
IT-601 Lecture Notes-UNIT-2.pdf Data Analysis
IT-601 Lecture Notes-UNIT-2.pdf Data AnalysisIT-601 Lecture Notes-UNIT-2.pdf Data Analysis
IT-601 Lecture Notes-UNIT-2.pdf Data Analysis
 
A SURVEY OF MARKOV CHAIN MODELS IN LINGUISTICS APPLICATIONS
A SURVEY OF MARKOV CHAIN MODELS IN LINGUISTICS APPLICATIONSA SURVEY OF MARKOV CHAIN MODELS IN LINGUISTICS APPLICATIONS
A SURVEY OF MARKOV CHAIN MODELS IN LINGUISTICS APPLICATIONS
 
Mcs 021 solve assignment
Mcs 021 solve assignmentMcs 021 solve assignment
Mcs 021 solve assignment
 
FAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MINING
FAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MININGFAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MINING
FAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MINING
 
soft computing BTU MCA 3rd SEM unit 1 .pptx
soft computing BTU MCA 3rd SEM unit 1 .pptxsoft computing BTU MCA 3rd SEM unit 1 .pptx
soft computing BTU MCA 3rd SEM unit 1 .pptx
 
KIT-601 Lecture Notes-UNIT-2.pdf
KIT-601 Lecture Notes-UNIT-2.pdfKIT-601 Lecture Notes-UNIT-2.pdf
KIT-601 Lecture Notes-UNIT-2.pdf
 
Calculation of the Minimum Computational Complexity Based on Information Entropy
Calculation of the Minimum Computational Complexity Based on Information EntropyCalculation of the Minimum Computational Complexity Based on Information Entropy
Calculation of the Minimum Computational Complexity Based on Information Entropy
 
A unified prediction of computer virus spread in connected networks
A unified prediction of computer virus spread in connected networksA unified prediction of computer virus spread in connected networks
A unified prediction of computer virus spread in connected networks
 
Simple (and Simplistic) Introduction to Econometrics and Linear Regression
Simple (and Simplistic) Introduction to Econometrics and Linear RegressionSimple (and Simplistic) Introduction to Econometrics and Linear Regression
Simple (and Simplistic) Introduction to Econometrics and Linear Regression
 
Sentence Validation by Statistical Language Modeling and Semantic Relations
Sentence Validation by Statistical Language Modeling and Semantic RelationsSentence Validation by Statistical Language Modeling and Semantic Relations
Sentence Validation by Statistical Language Modeling and Semantic Relations
 
Mcs 021
Mcs 021Mcs 021
Mcs 021
 
A data mining tool for the detection of suicide in social networks
A data mining tool for the detection of suicide in social networksA data mining tool for the detection of suicide in social networks
A data mining tool for the detection of suicide in social networks
 
Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...
Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...
Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...
 
An application of artificial intelligent neural network and discriminant anal...
An application of artificial intelligent neural network and discriminant anal...An application of artificial intelligent neural network and discriminant anal...
An application of artificial intelligent neural network and discriminant anal...
 

More from Editor IJCATR

Text Mining in Digital Libraries using OKAPI BM25 Model
 Text Mining in Digital Libraries using OKAPI BM25 Model Text Mining in Digital Libraries using OKAPI BM25 Model
Text Mining in Digital Libraries using OKAPI BM25 Model
Editor IJCATR
 
Green Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendlyGreen Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendly
Editor IJCATR
 
Policies for Green Computing and E-Waste in Nigeria
 Policies for Green Computing and E-Waste in Nigeria Policies for Green Computing and E-Waste in Nigeria
Policies for Green Computing and E-Waste in Nigeria
Editor IJCATR
 
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Editor IJCATR
 
Optimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation ConditionsOptimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation Conditions
Editor IJCATR
 
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Editor IJCATR
 
Web Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source SiteWeb Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source Site
Editor IJCATR
 
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 Evaluating Semantic Similarity between Biomedical Concepts/Classes through S... Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
Editor IJCATR
 
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 Semantic Similarity Measures between Terms in the Biomedical Domain within f... Semantic Similarity Measures between Terms in the Biomedical Domain within f...
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
Editor IJCATR
 
A Strategy for Improving the Performance of Small Files in Openstack Swift
 A Strategy for Improving the Performance of Small Files in Openstack Swift  A Strategy for Improving the Performance of Small Files in Openstack Swift
A Strategy for Improving the Performance of Small Files in Openstack Swift
Editor IJCATR
 
Integrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationIntegrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and Registration
Editor IJCATR
 
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 Assessment of the Efficiency of Customer Order Management System: A Case Stu... Assessment of the Efficiency of Customer Order Management System: A Case Stu...
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
Editor IJCATR
 
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Editor IJCATR
 
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Editor IJCATR
 
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Editor IJCATR
 
Hangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineHangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector Machine
Editor IJCATR
 
Application of 3D Printing in Education
Application of 3D Printing in EducationApplication of 3D Printing in Education
Application of 3D Printing in Education
Editor IJCATR
 
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Editor IJCATR
 
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Editor IJCATR
 
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsDecay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
Editor IJCATR
 

More from Editor IJCATR (20)

Text Mining in Digital Libraries using OKAPI BM25 Model
 Text Mining in Digital Libraries using OKAPI BM25 Model Text Mining in Digital Libraries using OKAPI BM25 Model
Text Mining in Digital Libraries using OKAPI BM25 Model
 
Green Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendlyGreen Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendly
 
Policies for Green Computing and E-Waste in Nigeria
 Policies for Green Computing and E-Waste in Nigeria Policies for Green Computing and E-Waste in Nigeria
Policies for Green Computing and E-Waste in Nigeria
 
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
 
Optimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation ConditionsOptimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation Conditions
 
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
 
Web Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source SiteWeb Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source Site
 
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 Evaluating Semantic Similarity between Biomedical Concepts/Classes through S... Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 Semantic Similarity Measures between Terms in the Biomedical Domain within f... Semantic Similarity Measures between Terms in the Biomedical Domain within f...
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 
A Strategy for Improving the Performance of Small Files in Openstack Swift
 A Strategy for Improving the Performance of Small Files in Openstack Swift  A Strategy for Improving the Performance of Small Files in Openstack Swift
A Strategy for Improving the Performance of Small Files in Openstack Swift
 
Integrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationIntegrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and Registration
 
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 Assessment of the Efficiency of Customer Order Management System: A Case Stu... Assessment of the Efficiency of Customer Order Management System: A Case Stu...
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
 
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
 
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
 
Hangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineHangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector Machine
 
Application of 3D Printing in Education
Application of 3D Printing in EducationApplication of 3D Printing in Education
Application of 3D Printing in Education
 
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
 
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
 
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsDecay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
 

Recently uploaded

Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
Prakhyath Rai
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
MadhavJungKarki
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
AjmalKhan50578
 
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
PIMR BHOPAL
 
Generative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdfGenerative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdf
mahaffeycheryld
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
TIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptxTIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptx
CVCSOfficial
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
upoux
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
Paris Salesforce Developer Group
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
aryanpankaj78
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
PreethaV16
 
morris_worm_intro_and_source_code_analysis_.pdf
morris_worm_intro_and_source_code_analysis_.pdfmorris_worm_intro_and_source_code_analysis_.pdf
morris_worm_intro_and_source_code_analysis_.pdf
ycwu0509
 
Gas agency management system project report.pdf
Gas agency management system project report.pdfGas agency management system project report.pdf
Gas agency management system project report.pdf
Kamal Acharya
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
upoux
 

Recently uploaded (20)

Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
 
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
 
Generative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdfGenerative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdf
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
TIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptxTIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptx
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
 
morris_worm_intro_and_source_code_analysis_.pdf
morris_worm_intro_and_source_code_analysis_.pdfmorris_worm_intro_and_source_code_analysis_.pdf
morris_worm_intro_and_source_code_analysis_.pdf
 
Gas agency management system project report.pdf
Gas agency management system project report.pdfGas agency management system project report.pdf
Gas agency management system project report.pdf
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
 

Ijsea04031005

  • 1. International Journal of Science and Engineering Applications Volume 4 Issue 3, 2015, ISSN-2319-7560 (Online) www.ijsea.com 100 Modified Page Rank Model in Investigation of Criminal Gang Ting LU Research Center for Cloud Computing North China University of Technology, Beijing 100043, China Qi Gao Department of Mathematics, Shandong Normal University, Jinan 250002 China. Xudong Wang Department of Information System, Shanghai University, Shanghai 201800,China Cong LIU Department of Computer Science, Shandong University of Science and Technology, Qingdao 266590, China Abstract:In this paper, we consider a criminal investigation on the collective guilt of part members in a working group. Assuming that the statistics we used are reliable, we present the Page Rank Model based on mutual information. First, we use the average mutual info rmation between non-suspicious topics and the suspicious topics to score the topics by degree of suspicion. Second, we build the correl ation matrix based on the degree of suspicion and acquire the corresponding Markov state transition matrix. Then, we set the original v alue for all members of the working group based on the degree of suspicion. At the last, we calculate the suspected degree of each me mber in the working group. In the small 10-people case, we build the improved Page Rank model. By calculating the statistics of this c ase, we acquire a table which indicates the ranking of the suspected degree. In contrast with the results given in this issue, we find thes e two results basically match each other, indicating the model we have built is feasible. In the current case, firstly, we obtain a ranking list on 15 topics in order of suspicion via Page Rank Model based on mutual information. Secondly, we acquire the stable point of Mar kov state transition matrix using the Markov chain. Then, we build the connection matrix based on the degree of suspicion and acquire the corresponding Markov state transition matrix. Last, we calculate the degree of 83 candidates. From the result, we can see that those suspicious are on the top of the ranking list while those innocent people are at the bottom of the list, representing that the model we ha ve built is feasible. When suspicious topics and conspirators changed, a relatively good result can also be obtained by this model. In th e current case, we have the evidence to believe that Dolores and Jerome, who are the senior managers, have significant suspicion. It is recommended that future attention should be paid to them. The Page Rank Model, based on mutual information, takes full account of t he information flow in message distribution network. This model can not only deal with the statistics used in conspiracy, but also be ap plied to detect the infected cells in a biological network. Finally, we present the advantages and disadvantages of this model and the dir ection of improvements. Keywords: Page Rank ;Markov Chain; Criminal Gangs; Biological Model; Algorithm; Markov Chain 1. INTRODUCTION 1.1 Background With the advent of the information age, information technology development has brought new challenges and opportunities to the public security work. Because of its superiority, people are paying close attention to how to integrate and reuse to the public security data resources and how to achieve comprehensive application of global data, the automatic association of all kinds of information as well as the automatic mining function of a variety of cues, which will provide integrated applications in the information handling. Using the semantic network analysis and the relevant models plays a major role in improving the efficiency and accuracy of detection. 1.2 What is “Crime Gangs”? Crime Gangs is a crime form, referring to the two or more persons jointly committing one or more crimes. Intelligence information (such as the collection of the relevant people’s conversations in this given case) is the technical basis of the intelligence analysis. The implementation of criminal intelligence analysis is based on intelligence gathering, mining and establishing crime patterns, analyzing and judging criminal clues as well as a variety of relationships. Building an efficient model to analyze the relevant information will surely provide some useful clues for the detection of cases and the judgment of criminal suspects. 1.3 The Mission of Our Team In this paper, we would like to introduce the theory of information analysis to solve the problems, which is described as follows: In the previous case, it is our team’s duty to identify the guilty parties among the 10 candidates. Similarly, the other problem is to solve a relatively larger case, where there are about 83 candidates. The analysis and process of these problems are divided into three steps. Firstly, we use the method of mutual information to score all the topics mentioned. Secondly, we can acquire the correlation matrix by calculating the score of the associated topics among the candidates. Thirdly, by solving the Markov Transfer Matrix, we get the stable point of Markov Transfer Matrix, which is the final index of 83 candidates. By analyzing this index, the 83 degree of suspicion can be determined. 2. PROBLEM ANALYSIS 2.1 Topics’ Suspicious Degree Analysis First, we analyze the suspicious degree of talks between each other, using the mutual information and entropy in information theory, defined as M(A,B) = I(A) + I(B) - I(A,B), to obtain the
  • 2. International Journal of Science and Engineering Applications Volume 4 Issue 3, 2015, ISSN-2319-7560 (Online) www.ijsea.com 101 scores of the 12 undetermined topics and the scores of suspicious ones(Obviously, the scores of the suspicious are supposed to be higher than the others). Further illustration is put in models. 2.2 The Transmission of Suspicious Information in the Working Group Analysis The work group is divided into five parts, namely, the confirmed suspects, the people with some suspicion, the undetermined people and the innocent (listed by the degree of suspicion). Because we refer to Google’s PangeRank algorithm, we need to obtain the correlation matrix of this group of people first. Then we can use this algorithm to get the Markov Transfer Matrix and later get the stable points using the nature of Markov. The acquisition of the correlation matrix is based on the message topics among the 83 people. We can use gij to represent the total scores of all the topics, thus getting an 83*83 correlation matrix. 2.3 The Initial Vector Distribution of the Working Group Analysis To solve the Markov stable point, we need to use the initial vector distribution. We define the scores of the suspicious as α (The total number of this group of people is n); the scores of the innocent is 0; the scores of the undecided is β (The total number of this group of people is m). They satisfy the equation nα + mβ =1, and then we can decide the values of α and β through the search of α with step size of 0.1 3. BASIC ASSUMPTIONS OF OUR MODEL 3.1. All data is true and reliable. 3.2. There is valid evidence to prove the people who are suspicious. 3.3. There is valid evidence to prove the people who are innocent. 3.4. The suspicious topics have higher degree of doubt than that of the undermined ones. 3.5. An objective and subjective attitude is kept in the process of handling the cases. 3.6. These topics give a valid summary of the messages. 4. MODEL AND SOLUTION Our whole model is divided into 3 parts, including 3.1, 3.2 and 3.3. In the 3.4 part, we use the whole model to analyze a simple example. And in 3.5 and 3.6, we solve the real problem presented in question 1, and its changed version in question 2. 4.1 Mutual Information Algorithm Let me put a simple example to better illustrate this algorithm. “What a good weather today! I would like to go fishing.” A says to B. The words, such as “today”, “weather”, “good”, “I”, “fishing” involved in this conversation, can be seen as key words, and we can use 1 2, , , na a a to represent them. When B says to A:“Yeah, really good weather! I will go climbing.” Also, the words such as “weather”, “hiking”, “good”, “I”, can be extracted as key words and we can use 1 2, , , mb b b to represent them. Here, we list the relationship between the words of these two people. Table 1: the language relationship table A today good fishing weather I 1 1 1 1 1 0 0 B weather I good climbing 0 0 0 1 1 1 1 Notes: “1” in the second row and second column of the table rep resents the key word “today” said by A, but “0” in the fourth ro w and second column represents that B didn’t say the key word “1”indicates the value of mentioned topic in the chat, “0”indicates the value of topic which is not mentioned in the table. We can use the formula of mutual information M(X,Y) = I(X) + I(Y) - I(X,Y)to get the value of the mutual information, defined as M(X,Y), where I(X) represents the entropy from A, I(Y) represents the entropy from B. 0 0 1 1( ) log logI X P P P P   (4.1-1) 0 0 1 1( ) log logI Y P P P P   (4.1-2) 10 10 11 11 01 01( , ) log log logI X Y P P P P P P    (4.1-3) P0 and P1 denoting the probability of 0 and 1 respectively; P10, P11 and P01 denoting the probability of (1, 0), (1, 1) and (0, 1) respectively. 4.2 Markov Chain Model In order to get the Markov state transition matrix, we first need to get the 83*83 Markov correlation matrix(rows represent the person’s words, columns represent the words that others said to him /her). According to each topic, sum up the weight of the words involved in the conversation between one person and the others so as to get the total weight of one person, in the same way, we can come to the other people’s weight, thus getting an 83*83 Markov correlation matrix. Although we use Google’s Page Rank model,some people are not the information receivers in the case, so it is unavoidable that the sum of a few columns in the association matrix is 0. Taking this into account, when computing the Markov Transfer Matrix, we do some special handling on the correlation matrix to make the sum of all the columns of the correlation matrix non-zero. Define the Markov Transfer Matrix as ( )ijA a , then ' j ij i c g  (4.2-1) ' i ij j r g  (4.2-2) Cj represents the sum of columns in matrix G(gij), ri represents the sum of rows in matrix G(gij), gij represents the elements in the correlation matrix G(gij). The formula used to solve the elements in transfer matrix A is ' (1 ) * ij ij j gd a d n c    (4.2-3) d is a model parameter, we choose to define d = 0.85 based on experience. aij represents the summed scores of the message topics involved in the conversation from person j to person i. From the basic nature of the Markov chain, there is a stationary distribution in the regular Markov chain 1 2( , , , )T Nx x x x ,then we can get the sorting in accordance with the conspiracy possibility. 4.3 Improved Page Rank Model As we have known,there are 7 conspirators among the 83 people in the second case and each person’s scores can be defined as ( ), 1,2, ,7P i i  . And the scores of each innocent person can be defined as P(j), j = 1,2,...,8. The model is as follows: 7 8 1 1 max ( , ) ( ) ( ) i j M s P i P j      (4.3-1)
  • 3. International Journal of Science and Engineering Applications Volume 4 Issue 3, 2015, ISSN-2319-7560 (Online) www.ijsea.com 102 . .st Ax x (4.3-2) 1 1 n i i x   (4.3-3) The objective function indicates the maximum probability gap between the known conspirators and the innocent (All the conspirators are put in the upper part of the list, and all innocence in the lower part of the list, leaving the undecided people located in the middle of the list). We use k to express the maximum of mutual information in the 12 topics.  represents the steps from the upper bound to 20. Through the debugging and analysis, we find that when  is given a value of 0.5, the results will be much more in line with the subject requirements. s is the initial vector distribution, the percentage of each conspirator is 0.1, and the percentage of each innocent person equals to 0, so the undetermined equally allocate the remaining percentage. We define that s ranges from 0.5 to 0.9 is distributed in steps of 0.1, and we can get an initial vector distribution on the subject on the whole. 4.4 Solution of The 10-people Case In practice, we conducted some exploratory analysis on the previous case, and get 4 ranking list of the probability of all the people when defining k =1,10,12,15,17,20,respectively. Through comparative analysis, we find that when k=17, the ranking we get will be more in line with the true outcome of the case than other values, that is, people like Inez don't get off, people like Carol are not falsely accused, and people like Bob do not have the opportunity to get reduced sentences. When k=17, we can obtain a ranking list of suspicious degree, listed as follows: Table 2:The Sorting Table of the degree of Suspicious (k=17) Ranking Number Name 1 7 George 2 2 Bob 3 9 Inez 4 4 Dave 5 5 Ellen 6 1 Anne 7 8 Harry 8 10 Jaye 9 3 Carol 10 6 Fred Conclusion Analysis: (1)George and Dave are the given co-conspirators, ranking fourth in the list. Meanwhile, Bob ranks second, illustrating he is one of the co-conspirators, so he cannot get off. Inez ranks third, meaning that we can also catch him. (2)Jaye and Anne are both ranked relatively rearward, which is in accordance with the given information. And based on Carol ranking No.9, we can basically determine her innocence. Overall, the solution derived from our models can meet the actual requirements and have some promotional value. From the previous analysis, we know that the 10-people case is a microcosm of the current case, and the results of small case subject has been given to us, so understanding and solving the smaller case can be seen as a test of our models, which may help us to modify them. 4.5 The Solution of the Current case for Problem 1 When conducting an exploratory analysis on the current case, we used the same way as the first one to analyze. We found that when k=17 or k=20, we can get two basically the same probability rankings of all the people, much more in line with the requirements listed in the subject. First, we can obtain the ranking list of the 15 topics using the Mutual Information Method. Table 3:Score Ranking List of 15 Topics Number Score 1 0.883016 2 0.857865 3 0.898072 4 0.87294 5 0.872976 6 0.857882 1 1 8 0.888021 9 0.883014 10 0.893037 11 1 12 0.888021 13 1 14 0.888034 15 0.883008 Notes: The numbers of suspicious topics are 7, 11, 13. The suspicious degree ranking of the suspected, innocent and the senior managers based on k=17. Table4: The Sorting Table Based on the Suspicious Degree of the Conspirators, Non-conspirators and Senior Managers (K= 17) Ranking Name Number 1 Yao 68 2 Alex 22 4 Paul 44 6 Harvey 50 7 Dolores 11 8 Ulf 55 17 Jerome 17 19 Jean 19 27 Paige 3 28 Elsie 38 31 Darlene 49 46 Chris 1 57 Tran 65 58 Ellin 69 60 Gretchen 5
  • 4. International Journal of Science and Engineering Applications Volume 4 Issue 3, 2015, ISSN-2319-7560 (Online) www.ijsea.com 103 Notes: The senior managers are Dolores, Jerome and Gretchen. Conclusion Analysis: (1) By analyzing the result, we can find that two senior managers, namely Dolores and Jerome are both conspirators. (2) The already known conspirators are shown in the forefront of the ranking list, we can basically draw that they are the conspirators. (3)The already known non-conspirators are all at the rear of the ranking list, except for Paige who ranks 27, the others can be determined to be innocent. Although there are a few minor differences, this result has been very much in line with the actual situation, which means the feasibility and stability of the model is very well. 4.6 The Solution of the Current Case for Problem 2 As to the second requirement, we can also use the Improved Page Rank Model to analyze data. First obtain a modified ranking list of the 15 topics, listed as follows: Table 5:Score Ranking List of the 15 Modified Topics number score 1 1 2 1.177737 3 1.20412 4 1.193429 5 1.172717 6 1.167063 7 1 8 1.199102 9 1.193429 10 1.20412 11 1 12 1.20412 13 1 14 1.173339 15 1.193429 Then we can get the ranking list about the suspicion degree of the suspected, the innocent and the senior managers. Table 6:The Sorting Table Based on the Suspicious Degree of the Conspirators, Non-conspirators and Senior Managers Number Name 1 Yao 2 Alex 4 Paul 6 Harvey 7 Dolores 8 Ulf 17 Jerome 19 Jean 27 Paige 28 Elsie 30 Darlene 45 Chris 57 Ellin 58 Tran 60 Gretchen Notes: The senior managers are Dolores, Jerome and Gretchen, the 7 suspected people are Yao, Alex, Paul, Harvey, Ulf, Elsie. Conclusion Analysis The newly added conspirator Chris does not make much difference in results compared with the ones in the first requirement. According to analysis, this may be due to Chris's inactive involvement in the conversation, so even if he is one of the conspirators, his influence on others is very weak, resulting in the basically similar results. 4.7 The Solution of the Current Case for Problem 3 In this section, we introduce the conception of Semantic network and apply the theory of Similarity to the calculation of topic scores. As we have obtained the original messages, which is a much bigger corpus than that we used in the first two questions, so we can apply the similarity analyze into our model. To describe it in detail: First: Calculate the similarities of among the 3 suspected messages(A) and the 12 unsuspected messages (B), A includes A1,A2,A3,B includes, ( , )i jSim A B d     (4.7-1) d : the distance between the two corpus.  : an changeable parameter.(usually between 0 and 1) Second: give the index rank of B1,B2,……,B12 12 1 ( , ),( 1,2,3)j i j j B Sim A B i    (4.7-2) Third: set the value of A1,A2,A3. ( ),( 1,2,3 1....12)i jA Max B i j   (4.7-3) So far, we successfully obtain the rank of the 15 messages, comparing with the rank based on the index of mutual information; this model theoretically provides a more credible result. 5. ADVANTAGES AND DISADVANTAGES 5.1 Advantages: We introduced the concept of mutual information when computing topics, and build the relationship between the suspicious topics and the undetermined ones. 5.2 Disadvantages: ●As it is mentioned in requirement 3 that due to the limitation of the message traffic, we can just roughly determine the doubt degree of the topics by semantic network analysis. ● Though the computing of the mutual information, we can just determine the values of the 12 undetermined topics, however, the values of the 3 higher suspected ones are artificially assigned. ●Without much experience for reference in the model, the accuracy of the results may be undermined.
  • 5. International Journal of Science and Engineering Applications Volume 4 Issue 3, 2015, ISSN-2319-7560 (Online) www.ijsea.com 104 6. PROMOTION OF THE MODEL Through the analysis, we found that our model is considerable promotional, such as being used as a method to find the infected or diseased cells in a biological network. Briefly speaking, if we can get the meaningful characteristics from all the cells can calculate the mutual information between these characteristics. Later, we can try to obtain the mutual information between the undetermined cells and the infected ones so as to get the probability ranking list of the undetermined. Though the detecting process, we may us the Improved Search-based Page Rank Model and the Markov Transfer Matrix to simplify our operation as well as increase the validity of our research. We have introduced the mutual information theory in analyzing this problem in the first two parts, with a relatively satisfactory result. As far as we know, semantic network analysis which is a widely used in artificial intelligence and computational linguistics. It provides a structure and process for reasoning about knowledge or language. And another useful computational linguistics capability in natural language processing is text analysis. 7. CONCLUSION In this paper, we introduce the model of improved Page Rank algorithm based on mutual information and successfully solved the case problems. The consequences are listed as follows: In the previous case, George and Dave are the given co-conspirators. Bob and Inez are proved other co-conspirators. Carol is innocent. Overall, the solution derived from our models can meet the actual requirements and have some promotional value. Then in the next case, by analyzing the result, we can find that two senior managers, namely Dolores and Jerome are both conspirators. This will help the investigation of the cases. The other version of the second case, the newly added suspect Chris does not make much difference in results compared with the ones in the first requirement. According to analysis, this may be due to Chris's inactive involvement in the conversation, so even if he is one of the conspirators, his influence on others is very weak, resulting in the basically similar results. All in all, as we only use the topics which are derived from original messages in mutual information analysis, so our result will be more valid if we have a larger corpus. That is to say, we can introduce semantic network and use similarity-computing to acquire a more precise result, in that way, our judgment will be more reasonable. 8. ACKNOWLEDGMENTS This work was supported in part by the Graduate Innovation Foundation Project of Shan-dong University of Science and Technology (YC140106). Also, we would like to thank those anonymous reviewers for their constructive comments to help us improve the paper. 9. REFERENCES [1]Haveliwala, T. (1999) Efficient Computation of PageRank. Technical Report. Stanford. [2]Battiti, R.(1994)Using mutual information for selecting features in supervised neural net learning. [3]Terry. (1999) The Page Rank Citation Ranking: Bringing Order to the Web. Technical Report. Stanford InfoLab. [4]Jackendoff, Ray S.(1972) Semantic Interpretation in Generative Grammar. [5]Xing, W., Ghorbani A. (2004) Weighted Page Rank algorithm, Communication Networks and Services Research. Proceedings. [6]Catherine Benincasa (2006) Page Rank Algorithm. [7]John F. Sowa (1991) Principles of Semantic Networks. Alexander Kraskov, Harald Stogbauer, and Peter Grassberger (2004) Estimating mutual information.